CuteNews 0.88/1.3 - 'example2.php' Cross-Site Scripting

Author: DarkBicho
type: webapps
platform: php
port: 
date_added: 2004-06-28  
date_updated: 2016-12-08  
verified: 1  
codes: CVE-2004-0660;OSVDB-7286  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 24239.txt  
source: https://www.securityfocus.com/bid/10620/info

It is reported that CuteNews is affected by multiple cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.

The problems present themselves when malicious HTML and script code is sent to the application through the 'id' parameter of the multiple scripts.

These issues could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user.

http://www.example.com/example2.php?subaction=showfull&id=<script>alert(document.cookie);</script>